Backup two tables from a network access db to a local db copy

I have an access database on a network that I need to copy 2 tables (say table1, table2) to local copy of the exact database. We need this as the network goes down frequently and work halts. I want a user to be able to click a button on a form and have them copy the updated network database tables to the older outdated tables on a local computer. Any suggestions?

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

My UpdateTempTable function does, with the other, you will first need to test to see whether the table already exists. And if it does, delete before running the transferdatabase method.

My UpdateTempTable function also will let you save the new table to a temporary database on the same path as your application, and will automatically link the table from that temporary database to your application, which will avoid some of the bloating issues associated with temporary tables.

Just a note, ...any system like this is inherently susceptible to failures.
I mean if: "the network goes down frequently and work halts"...

...Then whats to say that the network won't go down in the middle of your"Copy" operation.
Then what?!?!
Half the data is copied, and you loose the original?

You need "Rock Solid" error handling and an "Iron-Clad" "Rollback" system.
(remname the static tables, Import the new tables, verify the copy, delete the originals)
In case of a failure in the middle of the "Copy" operation, your system must be able to delete the incomplete copied table, then restore/rename the original table...
Do you have something like this in place?

It's a shame to have to go through all of this trouble for a "iff-y" network that can't fulfill one of the most basic requirements of a network...
;-)

The same time and energy might be better spent beefing up the network...

Featured Post

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

As with any other System Center product, the installation for the Authoring Tool can be quite a pain sometimes. This article serves to help you avoid making these mistakes and hopefully save you a ton of time on troubleshooting :)
Step 1: Make sur…

Software Metering within our group of companies has always been an afterthought until auditing of software and licensing became a pain point. Orchestrator and SCCM metering gave us the answer and it was an exciting process.

In Microsoft Access, learn the trick to repeating sub-report headings at the top of each page.
The problem with sub-reports and headings:
Add a dummy group to the sub report using the expression =1:
Set the “Repeat Section” property of the dummy…

Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…